CVE-2025-12760

5.4 MEDIUM

📋 TL;DR

This vulnerability allows attackers to bypass two-factor authentication (2FA) in Drupal's Email TFA module, potentially gaining unauthorized access to user accounts. It affects Drupal sites using Email TFA module versions before 2.0.6. The bypass occurs through an alternate authentication path or channel.

💻 Affected Systems

Products:
  • Drupal Email TFA module
Versions: 0.0.0 through 2.0.5
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Drupal sites with Email TFA module enabled and configured for 2FA.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access to Drupal sites, leading to data theft, site defacement, or complete system compromise.

🟠

Likely Case

Attackers bypass 2FA for regular user accounts, accessing sensitive data and performing unauthorized actions within their permission scope.

🟢

If Mitigated

Attackers bypass 2FA but are still limited by other security controls like role-based permissions and network segmentation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires knowledge of the alternate authentication path but is technically simple once identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.6

Vendor Advisory: https://www.drupal.org/sa-contrib-2025-115

Restart Required: No

Instructions:

1. Update Email TFA module to version 2.0.6 via Drupal's update manager or Composer. 2. Clear Drupal caches. 3. Verify the update was successful.

🔧 Temporary Workarounds

Disable Email TFA module

all

Temporarily disable the vulnerable module until patching is possible

drush pm:disable email_tfa

Enable additional authentication controls

all

Implement IP restrictions or rate limiting on authentication endpoints

🧯 If You Can't Patch

  • Implement network segmentation to isolate Drupal servers from sensitive systems
  • Enable detailed authentication logging and monitor for suspicious login patterns

🔍 How to Verify

Check if Vulnerable:

Check Email TFA module version in Drupal admin at /admin/modules or via 'drush pm:list | grep email_tfa'

Check Version:

drush pm:list | grep email_tfa

Verify Fix Applied:

Confirm Email TFA module version is 2.0.6 or higher and test 2FA functionality

📡 Detection & Monitoring

Log Indicators:

  • Authentication attempts bypassing 2FA flow
  • Multiple failed login attempts followed by successful login without 2FA
  • Unusual user agent patterns during authentication

Network Indicators:

  • HTTP requests to alternate authentication endpoints
  • Authentication traffic patterns deviating from normal 2FA flow

SIEM Query:

source="drupal" AND (event_type="authentication" AND NOT 2fa_completed="true")

🔗 References

📤 Share & Export